Download Spotting Email Viruses

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
SPOTTING EMAIL VIRUSES
Virus Identification
Spotting
Email
Viruses
SPOTTING VIRUSES
EMAIL BASED VIRUSES
The Problem with Viruses
by Frank Paolino, MayFlower Software
The increase in recent Virus activity has been noticeable,
and the sophisticated techniques the virus makers use to
evade detection make the job of stopping them that much
more challenging.
Lately, with the outbreak of CryptoLocker, we have
seen a new level of viruses, called “ransom ware”
where they lock all of your files on your machine, all of
your Word docs and Excel spreadsheets, and you must
pay a ransom for the unlock key.
The problem with viruses is that they masquerade as something you want to open by
either promising you something you want or scaring you with something you fear.
Most do their work
silently. After all, a thief
wants to take what they
can without you
knowing, or you might
attempt to stop them.
Many times, a new message
appears and I ask "Is this
some new attempt to get
me to infect my machine"?
Many of my customers ask
me the same question, so I
put a live stream of
recently caught viruses
subjects and attachment
names on our website at
www.maysoft.com.
Obviously, I did not put the
viruses, just their names.
This short guide
explains some of the
ways to spot a virus.
There are lots of
different approaches,
and those of us who
work stopping these
viruses have to be
careful or we can infect our own machines (something I have unfortunately done).
Viruses are often spread via email the same way spam is
spread. The big difference is that the virus wants to steal
from you without you knowing in most cases.
I cannot list every tactic, mostly because they change every day. But reading this guide
will make you stop and think and possibly delay before opening any attachment, then it
will have raised your awareness of this problem.
Viruses want data on your machine, or they want to make
your machine into a “zombie” to send out more spam and
viruses to others.
Good luck, and don’t open that attachment!
SPOTTING EMAIL VIRUSES
| VIRUS IDENTIFICATION
2
Scare Me
The “Scare Me” virus wants you to panic and in your panic rush to open
an attachment to “fix” the problem, or find out more details.
Yes, the titles of many of these mail messages appear scary and that is
what the senders of the email want, to scare you into opening the
message and reading the body, then launching the phony "notice".
There are many flavors of this, but here are a few to give you an idea:
Illegal Software Use
Important – Payment Overdue
Judicial Summons
VISA – Recent Transaction Report
Your FED TAX payment (ID : 87VIRS8xxx) was Rejected
Here is a sample of a phony notice that appears to come from JonesDay, one of many
law firms that were spoofed trying to trick recipients into opening the malware.
ATTN: Important Bank Documents
Department of Treasury Notice of Outstanding Obligation
Read more about spoofed mail messages here.
FW : DNB Complaint
Order #NR7688 is processed
Notice to Appear In Court
TIP
If you are scared by the title, you will be really
scared by the damage the virus will inflict if you
launch it.
Don’t open unknown attachments!
SPOTTING EMAIL VIRUSES
| VIRUS IDENTIFICATION
Dear Friend
The “Dear Friend” or any other greeting that does not use your name is
a strong indicator that the message is a spam message or if it has an
attachment, contains a virus.
TIP
If you don’t know the sender, don’t open the attachment or
click on the links.
Too Many Friends
The “Too Many Friends” is an email that only you should receive, but
you find 10, or 20 names in the “To” field, most of whom you do not
recognize.
TIP
You can have “Too Many Friends” if Viruses are being sent
to you.
3
SPOTTING EMAIL VIRUSES
| VIRUS IDENTIFICATION
I Have No Name
The “I Have No Name” is an email that only you should receive, but
your name in not in the “To” field. This was probably sent out as a
large BCC email.
This most likely has an attachment, and that contains a virus.
TIP
If it is not addressed to you, don’t open it.
Fake Attachments
The “Fake Attachments” pretend to be something safe. Everyone
knows (or should know) not to click on and EXE attachment, so many
of these are disguised as Word documents or PDF attachments, or a
JPG photo.
If strange women are sending “Photos of Me”, it is probably NOT your
lucky day. In fact, if you open these “photos” they are probably viruses
and it is definitely your unlucky day.
TIP
If it is inside a ZIP file (or RAR file, another compression
format) do NOT open it.
If you are convinced it is a good attachments, detach it to
your machine and your anti-virus software might catch it.
Best answer: Send it to IT and infect their machine.
4
SPOTTING EMAIL VIRUSES
| VIRUS IDENTIFICATION
Wrong on So
Many Levels
The “Wrong on So Many Levels” breaks all the rules of what NOT to do
if you send viruses trying to infect machines.
1. No SendTo
2. Contains a Zip with an EXE inside
3. Not personalized
4. Signature incomplete.
TIP
If you get a “Wrong on So Many Levels”, laugh at the virus
maker’s incompetence and know you are probably having a
better day than he is…
…and don’t open the attachments.
5